Sciweavers

1272 search results - page 178 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
PERCOM
2006
ACM
16 years 3 months ago
Avoiding privacy violations caused by context-sensitive services
The increasing availability of information about people's context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a s...
Urs Hengartner, Peter Steenkiste
ICNP
2009
IEEE
15 years 11 months ago
Multipath load-adaptive routing: putting the emphasis on robustness and simplicity
— We propose a routing and load-balancing approach with the primary goal of being robust to sudden topological changes and significant traffic matrix variations. The proposed m...
Amund Kvalbein, Constantine Dovrolis, Chidambaram ...
BIRD
2007
Springer
128views Bioinformatics» more  BIRD 2007»
15 years 10 months ago
Efficient and Scalable Indexing Techniques for Biological Sequence Data
We investigate indexing techniques for sequence data, crucial in a wide variety of applications, where efficient, scalable, and versatile search algorithms are required. Recent res...
Mihail Halachev, Nematollaah Shiri, Anand Thamildu...
MOBIQUITOUS
2005
IEEE
15 years 10 months ago
Practical Broadcast Authentication in Sensor Networks
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-l...
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodi...
ICCVW
1999
Springer
15 years 8 months ago
An Experimental Comparison of Stereo Algorithms
While many algorithms for computing stereo correspondence have been proposed, there has been very little work on experimentally evaluating algorithm performance, especially using r...
Richard Szeliski, Ramin Zabih